请输入您要查询的百科知识:

 

词条 Security-focused operating system
释义

  1. Linux

      Android-based    Debian-based    Fedora-based    Gentoo-based    Other Linux distributions  

  2. BSD-based

  3. Object-capability systems

  4. Solaris-based

  5. Windows Server

  6. See also

  7. References

{{Use dmy dates|date=July 2018}}{{Information security}}

This is a list of operating systems specifically focused on security. General-purpose operating systems may be secure in practice, without being specifically "security-focused".

Similar concepts include security-evaluated operating systems that have achieved certification from an auditing organization, and trusted operating systems that provide sufficient support for multilevel security and evidence of correctness to meet a particular set of requirements.

Linux

Android-based

  • PrivatOS is a hardened proprietary operating system for Blackphone.
  • Replicant is a FOSS operating system based on the Android mobile platform, which aims to replace all proprietary Android components with their free software counterparts. It is available for several smartphones and tablet computers.[1][2][3][4] In March 2014, the Replicant project announced the discovery of a backdoor present in a wide range of Samsung Galaxy products that allows the baseband processor to read and write the device's storage,[5][6] sometimes with normal user privileges and sometimes as the root user, depending on device model.[7] It is not generally known whether Samsung's proprietary firmware for the radio chip can be remotely instructed to use these access features and the intentions of creating such a backdoor.

Debian-based

  • Subgraph is a Linux-based operating system designed to be resistant to surveillance and interference by sophisticated adversaries over the Internet. Subgraph OS is designed with features which aim to reduce the attack surface of the operating system, and increase the difficulty required to carry out certain classes of attack. This is accomplished through system hardening and a proactive, ongoing focus on security and attack resistance. Subgraph OS also places emphasis on ensuring the integrity of installed software packages through deterministic compilation. Subgraph OS features a kernel hardened with the Grsecurity and PaX patchset, Linux namespaces, and Xpra for application containment, mandatory file system encryption using LUKS, resistance to cold boot attacks, and is configured by default to isolate network communications for installed applications to independent circuits on the Tor anonymity network.{{Citation needed|date=October 2016}}
  • Tails is a security-focused Linux distribution aimed at preserving privacy and anonymity.[8]
  • Whonix[9][10] is an anonymous general purpose operating system based on VirtualBox, Debian GNU/Linux and Tor. By Whonix design, IP and DNS leaks are impossible. Not even Malware as Superuser can find out the user's real IP address/location. This is because Whonix consists of two (virtual) machines. One machine solely runs Tor and acts as a gateway, called Whonix-Gateway. The other machine, called Whonix-Workstation, is on a completely isolated network. Only connections through Tor are possible.

Fedora-based

  • Qubes OS is a desktop operating system based around the Xen hypervisor that allows grouping programs into a number of isolated sandboxes (virtual machines) to provide security. Windows for programs running within these sandboxes ("security domains") can be color coded for easy recognition. The security domains are configurable, they can be transient (changes to the file system will not be preserved), and their network connection can be routed through special virtual machines (for example one that only provides Tor networking). The operating system provides secure mechanisms for copy and paste and for copying files between the security domains.[11]

Gentoo-based

  • Tin Hat Linux is derived from Hardened Gentoo Linux. It aims to provide a very secure, stable, and fast desktop environment that lives purely in RAM.[12]

Other Linux distributions

  • Alpine Linux is a lightweight musl and BusyBox-based distribution. It uses PaX and grsecurity patches in the default kernel and compiles all packages with stack-smashing protection. Version 3.8.1 was released 11 September 2018.
  • EnGarde Secure Linux is a secure platform designed for servers. It has had a browser-based tool for MAC using SELinux since 2003. Additionally, it can be accompanied with Web, DNS, and email enterprise applications, specifically focusing on security without any unnecessary software. The community platform of EnGarde Secure Linux is the bleeding-edge version freely available for download.{{Citation needed|date=October 2016}}
  • Immunix was a commercial distribution of Linux focused heavily on security. They supplied many systems of their own making, including StackGuard; cryptographic signing of executables; race condition patches; and format string exploit guarding code. Immunix traditionally releases older versions of their distribution free for non-commercial use. The Immunix distribution itself is licensed under two licenses: The Immunix commercial and non-commercial licenses. Many tools within are GPL, however; as is the kernel.{{Citation needed|date=October 2016}}
  • Solar Designer's Openwall Project (Owl) was the first distribution to have a non-executable userspace stack, /tmp race condition protection, and access control restrictions to /proc data, by way of a kernel patch. It also features a per-user tmp directory via the pam_mktemp PAM module, and supports Blowfish password encryption.

BSD-based

  • OpenBSD is a research operating system for developing new security mitigations.[13]
  • TrustedBSD is a sub-project of FreeBSD designed to add trusted operating system extensions, targeting the Common Criteria for Information Technology Security Evaluation (see also Orange Book). Its main focuses are working on access control lists, event auditing, extended attributes, mandatory access controls, and fine-grained capabilities. Since access control lists are known to be confronted with the confused deputy problem, capabilities are a different way to avoid this issue. As part of the TrustedBSD project, there is also a port of NSA's FLASK/TE implementation to run on FreeBSD. Many of these trusted extensions have been integrated into the main FreeBSD branch starting at 5.x.

Object-capability systems

{{Expand section|date=January 2018}}

These operating systems are all engineered around the object-capabilities security paradigm, where instead of having the system deciding if an access request should be granted the bundling of authority and designation makes it impossible to request anything not legitimate.

  • CapROS
  • EROS
  • Genode
  • Fiasco.OC
  • KeyKOS
  • seL4

Solaris-based

  • Trusted Solaris was a security-focused version of the Solaris Unix operating system. Aimed primarily at the government computing sector, Trusted Solaris adds detailed auditing of all tasks, pluggable authentication, mandatory access control, additional physical authentication devices, and fine-grained access control. Trusted Solaris is Common Criteria certified.[14][15] The most recent version, Trusted Solaris 8 (released 2000), received the EAL4 certification level augmented by a number of protection profiles. Telnet was vulnerable to buffer overflow exploits until patched in April 2001.[16]

Windows Server

Starting with Windows Server 2008, Windows Server has added an installation option called "Server Core", in which the traditional graphical user interface is not installed. Administration, in Windows Server 2008, should rely on Windows Command Prompt. Roles and components are then installed individually. This option reduces the Windows Server footprint, the result of which is reduced demand on system resources and reduced number of components that could potentially be exploited via potential security vulnerabilities.[17]

Later, with Windows Server 2016, Microsoft introduced a Nano Server installation option with even more reduced footprint. It is headless and does not support a locally connected keyboard and monitor.[18] Nano Server in Windows Server 1709 (the constantly updated sibling of Windows Server 2016) can only be installed in a container.[19]

See also

{{columns-list|colwidth=22em|
  • Capabilities and access control lists
  • Comparison of operating systems
  • Damn Vulnerable Linux
  • IX (operating system)
  • OpenBSM
  • Operating system (section Security)
  • Security engineering
  • Security-evaluated operating system
  • Trusted operating system

}}

References

1. ^{{cite web| url = http://redmine.replicant.us/| title = Overview – Replicant| publisher = Redmine.replicant.us| accessdate = 30 September 2013| archive-url = https://web.archive.org/web/20131008095453/http://redmine.replicant.us/| archive-date = 8 October 2013| dead-url = no| df =}}
2. ^{{cite web| author = Paul Kocialkowski| url = http://redmine.replicant.us/projects/replicant/wiki| title = WikiStart – Replicant| publisher = Redmine.replicant.us| date = 4 February 2012 | accessdate = 30 September 2013| archive-url = https://web.archive.org/web/20131004072726/http://redmine.replicant.us/projects/replicant/wiki| archive-date = 4 October 2013| dead-url = no}}
3. ^{{cite web| url = https://www.gnu.org/philosophy/android-and-users-freedom.en.html| title = Android and Users' Freedom – GNU Project – Free Software Foundation| publisher = Gnu.org| accessdate = 30 September 2013| archive-url = https://web.archive.org/web/20130927184652/http://www.gnu.org/philosophy/android-and-users-freedom.en.html| archive-date = 27 September 2013| dead-url = no| df =}}
4. ^{{cite web| url = http://replicant.us/about/| title = About| publisher = Replicant project| accessdate = 30 September 2013| deadurl = yes| archiveurl = https://web.archive.org/web/20130926034733/http://replicant.us/about/| archivedate = 26 September 2013| df =}}
5. ^{{cite web| title = Samsung Galaxy devices may have backdoor to user data, developer says| url = http://www.cnet.com/news/samsung-galaxy-devices-may-have-backdoor-to-user-data-developer-says/| publisher = CNET| accessdate = 25 April 2014| author = Don Reisinger| date = 13 March 2014| archive-url = https://web.archive.org/web/20140427024944/http://www.cnet.com/news/samsung-galaxy-devices-may-have-backdoor-to-user-data-developer-says/| archive-date = 27 April 2014| dead-url = no}}
6. ^{{cite web| title = Replicant Developers Find Backdoor in Android Samsung Galaxy Devices| url = https://www.phoronix.com/scan.php?page=news_item&px=MTYyODE| work = Phoronix| accessdate = 25 April 2014| author = Michael Larabel| date = 12 March 2014| archive-url = https://web.archive.org/web/20140330164240/http://www.phoronix.com/scan.php?page=news_item&px=MTYyODE| archive-date = 30 March 2014| dead-url = no}}
7. ^{{cite web| title = Samsung Galaxy Back-door| url = http://redmine.replicant.us/projects/replicant/wiki/SamsungGalaxyBackdoor| work = Replicant Wiki| accessdate = 25 April 2014| author = Paul Kocialkowski| archiveurl = https://web.archive.org/web/20140406064637/http://redmine.replicant.us/projects/replicant/wiki/SamsungGalaxyBackdoor| archivedate = 6 April 2014}}
8. ^{{Cite web| url = https://lwn.net/Articles/440279/| title = The Amnesic Incognito Live System: A live CD for anonymity [LWN.net]| last = Vervloesem| first = Koen| date = 27 April 2011| website = lwn.net| access-date = 14 June 2017| archive-url = https://web.archive.org/web/20170821050853/https://lwn.net/Articles/440279/| archive-date = 21 August 2017| dead-url = no| df =}}
9. ^{{cite web| url = https://github.com/Whonix/Whonix| title = Whonix/Whonix| website = GitHub| accessdate = 9 April 2018| archive-url = https://web.archive.org/web/20161125182133/https://github.com/Whonix/Whonix/| archive-date = 25 November 2016| dead-url = no}}
10. ^{{cite web| url = https://www.computerworld.com.au/article/452277/whonix_an_os_era_anonymous_wikileaks/| title = Whonix: An OS for the era of Anonymous and Wikileaks| website = computerworld.com.au| accessdate = 9 April 2018| archive-url = https://web.archive.org/web/20171107005846/https://www.computerworld.com.au/article/452277/whonix_an_os_era_anonymous_wikileaks/| archive-date = 7 November 2017| dead-url = no}}
11. ^{{cite web| url = https://www.qubes-os.org/| title = Redirecting...| work = qubes-os.org| accessdate = 30 April 2017| archive-url = https://web.archive.org/web/20170503213651/https://www.qubes-os.org/| archive-date = 3 May 2017| dead-url = no}}
12. ^{{cite web |url = http://tinhat.sourceforge.net |title = Tin Hat |publisher = D'Youville College |access-date = 4 September 2015 |archive-url = https://web.archive.org/web/20160303201953/http://tinhat.sourceforge.net/ |archive-date = 3 March 2016 |dead-url = yes |df = dmy-all}}
13. ^{{cite web|title=Pledge() - A New Mitigation Mechanism|url=https://www.openbsd.org/papers/hackfest2015-pledge/mgp00002.html|access-date=8 October 2018}}
14. ^{{cite web| url = http://wwws.sun.com/software/security/securitycert/trustedsolaris.html| title = Sun Common Criteria Certification| date = 13 October 2004| website = archive.org| accessdate = 9 April 2018| deadurl = yes| archiveurl = https://web.archive.org/web/20041013000439/http://wwws.sun.com/software/security/securitycert/trustedsolaris.html| archivedate = 13 October 2004| df =}}
15. ^{{cite web| url = http://www.sun.com/software/security/securitycert/images/TSol8_7-03CMS.jpg| title = Wayback Machine| date = 12 March 2007| website = archive.org| accessdate = 9 April 2018| deadurl = bot: unknown| archiveurl = https://web.archive.org/web/20070312070621/http://www.sun.com/software/security/securitycert/images/TSol8_7-03CMS.jpg| archivedate = 12 March 2007| df =}}
16. ^{{cite web| url = http://www.mirrorservice.org/sites/ftp.sun.co.uk/patchroot/all_unsigned/113431-01.README| title = Sun Patch: Trusted Solaris 8 4/01: in.telnet patch| date = 4 October 2002| quote = 4734086 in.telnetd vulnerable to buffer overflow ?? (Solaris bug 4483514)| accessdate = 13 August 2012}}{{dead link|date=July 2018 |bot=InternetArchiveBot |fix-attempted=yes }}
17. ^{{Cite web| url = https://docs.microsoft.com/en-us/windows-server/administration/server-core/what-is-server-core-2008| title = What is Server Core 2008| last = Lohr| first = Heidi| date = 1 November 2017| website = Docs| publisher = Microsoft| access-date = 27 January 2018| archive-url = https://web.archive.org/web/20180127202344/https://docs.microsoft.com/en-us/windows-server/administration/server-core/what-is-server-core-2008| archive-date = 27 January 2018| dead-url = no}}
18. ^{{Cite web| url = https://docs.microsoft.com/en-us/windows-server/get-started/getting-started-with-nano-server| title = Install Nano Server| last = Poggemeyer| first = Liza| last2 = Hall| first2 = Justin| date = 6 September 2017| website = Docs| publisher = Microsoft| access-date = 27 January 2018| archive-url = https://web.archive.org/web/20180127202511/https://docs.microsoft.com/en-us/windows-server/get-started/getting-started-with-nano-server| archive-date = 27 January 2018| dead-url = no}}
19. ^{{Cite web| url = https://docs.microsoft.com/en-us/windows-server/get-started/nano-in-semi-annual-channel| title = Changes to Nano Server in Windows Server Semi-Annual Channel| last = Poggemeyer| first = Liza| last2 = Lich| first2 = Brian| website = Docs| publisher = Microsoft| access-date = 27 January 2018| archive-url = https://web.archive.org/web/20180127202441/https://docs.microsoft.com/en-us/windows-server/get-started/nano-in-semi-annual-channel| archive-date = 27 January 2018| dead-url = no}}

3 : Operating system security|Operating system technology|Security

随便看

 

开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。

 

Copyright © 2023 OENC.NET All Rights Reserved
京ICP备2021023879号 更新时间:2024/9/22 19:48:00